Skip to main content

Network Security

Firewall Bypass Techniques: Tools and Best Practices

··3471 words·17 mins· loading · loading
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.

IoT Security: Best Practices and Common Vulnerabilities

··3610 words·17 mins· loading · loading
This article provides a detailed overview of IoT security best practices and common vulnerabilities for an advanced audience of experienced security professionals, covering topics such as secure communication protocols, firmware updates, strong passwords, network segmentation, and more.

Advanced Network Security: Intrusion Prevention Systems (IPS)

··3361 words·16 mins· loading · loading
This article provides advanced technical details on Intrusion Prevention Systems (IPS), including what they are, how they work, tools and techniques for testing them, and specific examples of open source and commercial IPS systems.

Advanced Network Attacks: Layer 2/3 Dominance

··648 words·4 mins· loading · loading
Forget volumetric DDoS. The real damage happens inside the perimeter. We explore IPv6 shadow networks, NAC bypasses, and VLAN hopping techniques for the modern Red Team.